My name is Rakesh and saying I am a huge nerd would probably be an understatement.. I love technology and getting my hands into the CLI or trying something new. I started this page because I've had a lot of people ask for help with some of the things I've either deployment in my professional career or at clients.
Tuesday, 8 July 2025
Tuesday, 1 July 2025
IKEv1 vs IKEv2
IKEv1 is not used at all. IKEv2 provides several enhancements compared to IKEv1, including:
EAP authentication. IKEv2 can use an authentication, authorization, and accounting (AAA) server to remotely authenticate mobile and PC users and assign private addresses to these users. IKEv1 does not provide this function and must use Layer 2 Tunneling Protocol (L2TP) to assign private addresses.
IKEv2 simplifies the SA negotiation process. IKEv2 uses two exchanges (a total of four messages) to create an IKE SA and a pair of IPsec SAs, as compared to the six messages exchanged in IKE v1. To create multiple pairs of IPsec SAs, only one additional exchange is needed for each additional pair of SAs.
Support for asymmetric authentication.
Built-in NAT traversal.
Support for FlexVPN.
🔥 The Hidden Risk of “Wide Open” Internal Policies — And How To Remove Them Safely
In one of my recent projects, I noticed a wide open internal traffic policy in place. Later, I was asked to work on this issue and remove th...
-
In Web Development, "Webhook" is a method of augmenting or altering the behavior of a Web Page or Web Application with custom ca...
-
Commands Explaination Config# date MMDDhhmmYYYY.ss System - Fri Sep 7 17:19:10 PDT 2018 #tmsh list sys management-ip ...
-
An important detail, all commands in this list have been validated in TMOS v13 . Older or newer versions may have differences, so confirm...
